In the Linux kernel, the following vulnerability has been resolved:
netrom: Decrease sock refcount when sock timers expire
Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use
sock timer API. It replaces mod_timer() by sk_reset_timer(), and
del_timer() by sk_stop_timer().
Function sk_reset_timer() will increase the refcount of sock if it is
called on an inactive timer, hence, in case the timer expires, we need to
decrease the refcount ourselves in the handler, otherwise, the sock
refcount will be unbalanced and the sock will never be freed.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T14:35:18.034Z
Updated: 2024-12-19T07:39:10.054Z
Reserved: 2024-05-21T13:27:52.130Z
Link: CVE-2021-47294

Updated: 2024-08-04T05:32:08.527Z

Status : Awaiting Analysis
Published: 2024-05-21T15:15:17.323
Modified: 2024-11-21T06:35:48.923
Link: CVE-2021-47294
